This problem is triggered by scanningthe PostScript file and can be exploited by an attacker sending amalformed PostScript or PDF file. The attacker is able to causearbitrary code to be run with the privileges of the victim.